General
-
Target
4e52198b897fd4309940f835b3af9733e457f14fe9d3ac9d25ee973bac395d38N.exe
-
Size
555KB
-
Sample
241119-szhl3axfnh
-
MD5
d1e50768b13c70c4afcb0f31dd997530
-
SHA1
d16654c55adf4fe8738a9a8169249921da03af88
-
SHA256
4e52198b897fd4309940f835b3af9733e457f14fe9d3ac9d25ee973bac395d38
-
SHA512
193ea9a3491036a6aa173b40970c68daea81d706d9928c727d0a149ece7f5eaa1fa3668990a589e5812c2fd89806e90465f3b7fe4448618b8379d1c18a2845e2
-
SSDEEP
12288:WMray90rcYRZZrrp/YmxuUpV71HnCL6pUGjAAxI9grdt:wyEcYRZ9bxfV7y3GjRI9KD
Static task
static1
Behavioral task
behavioral1
Sample
4e52198b897fd4309940f835b3af9733e457f14fe9d3ac9d25ee973bac395d38N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
4e52198b897fd4309940f835b3af9733e457f14fe9d3ac9d25ee973bac395d38N.exe
-
Size
555KB
-
MD5
d1e50768b13c70c4afcb0f31dd997530
-
SHA1
d16654c55adf4fe8738a9a8169249921da03af88
-
SHA256
4e52198b897fd4309940f835b3af9733e457f14fe9d3ac9d25ee973bac395d38
-
SHA512
193ea9a3491036a6aa173b40970c68daea81d706d9928c727d0a149ece7f5eaa1fa3668990a589e5812c2fd89806e90465f3b7fe4448618b8379d1c18a2845e2
-
SSDEEP
12288:WMray90rcYRZZrrp/YmxuUpV71HnCL6pUGjAAxI9grdt:wyEcYRZ9bxfV7y3GjRI9KD
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1